Derek Noonburg sent us a patch for xpdf to correct a number of security issues. This is due to be public 20051201. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue affects RHEL3, RHEL3, RHEL2.1
Created attachment 121332 [details] Proposed patch from Derek
This issue is now public: http://www.foolabs.com/xpdf/download.html
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-840.html
The original fix for these issues was incomplete, reopening bug.
Created attachment 122226 [details] Patch from Ubuntu
Created attachment 122227 [details] Patch from Dirk Mueller to add additional missing checks
There aren't currently any reproducers for these issues. Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and poppler. Some cooperation will probably make things easier.
it's now fixed in xpdf-3.00-11.10
xpdf-2.02-9.8 and xpdf-0.92-17
Adding the folling CVE ids to this errata: CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 These were all fixed in the errata RHSA-2005:840